CVE-2018-25032 (CNNVD-202203-2221)
HIGH
中文标题:
zlib 缓冲区错误漏洞
英文标题:
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has...
CVSS分数:
7.5
发布时间:
2022-03-25 00:00:00
漏洞类型:
缓冲区错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
zlib是美国Mark Adler个人开发者的一个通用的数据压缩库。 zlib 1.2.11 版本存在缓冲区错误漏洞,该漏洞源于如果输入有很多远匹配,压缩时可能出现内存损坏。
英文描述:
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| nokogiri | nokogiri | * | - | - |
cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:ruby:*:*
|
| python | python | * | - | - |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
|
| zlib | zlib | * | - | - |
cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 34 | - | - |
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 35 | - | - |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 36 | - | - |
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.15.7 | - | - |
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
|
| apple | macos | * | - | - |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
|
| mariadb | mariadb | * | - | - |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | - | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
|
| netapp | e-series_santricity_os_controller | * | - | - |
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
|
| netapp | management_services_for_element_software | - | - | - |
cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*
|
| netapp | oncommand_workflow_automation | - | - | - |
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
|
| netapp | ontap_select_deploy_administration_utility | - | - | - |
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
|
| netapp | hci_compute_node | - | - | - |
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
|
| netapp | h300s_firmware | - | - | - |
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h500s_firmware | - | - | - |
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h700s_firmware | - | - | - |
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h410s_firmware | - | - | - |
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
|
| netapp | h410c_firmware | - | - | - |
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
|
| siemens | scalance_sc622-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc622-2c_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_sc626-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc626-2c_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_sc632-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc632-2c_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_sc636-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc636-2c_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_sc642-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc642-2c_firmware:*:*:*:*:*:*:*:*
|
| siemens | scalance_sc646-2c_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*
|
| azul | zulu | 6.45 | - | - |
cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*
|
| azul | zulu | 7.52 | - | - |
cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*
|
| azul | zulu | 8.60 | - | - |
cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*
|
| azul | zulu | 11.54 | - | - |
cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*
|
| azul | zulu | 13.46 | - | - |
cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*
|
| azul | zulu | 15.38 | - | - |
cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*
|
| azul | zulu | 17.32 | - | - |
cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*
|
| goto | gotoassist | * | - | - |
cpe:2.3:a:goto:gotoassist:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
[oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
mailing-list
cve.org
访问
cve.org
[oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
mailing-list
cve.org
访问
cve.org
DSA-5111
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
mailing-list
cve.org
访问
cve.org
FEDORA-2022-413a80a102
vendor-advisory
cve.org
访问
cve.org
FEDORA-2022-dbd2935e44
vendor-advisory
cve.org
访问
cve.org
FEDORA-2022-12b89e2aad
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
mailing-list
cve.org
访问
cve.org
20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
mailing-list
cve.org
访问
cve.org
20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
mailing-list
cve.org
访问
cve.org
20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
mailing-list
cve.org
访问
cve.org
FEDORA-2022-61cf1c64f6
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
FEDORA-2022-3a92250fd5
vendor-advisory
cve.org
访问
cve.org
FEDORA-2022-b58a85e167
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
mailing-list
cve.org
访问
cve.org
GLSA-202210-42
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
CVSS评分详情
3.1 (adp)
HIGH
7.5
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2022-03-25 00:00:00
修改时间:
2025-05-06 14:19:53
创建时间:
2025-11-11 15:35:15
更新时间:
2025-11-11 15:57:11
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-25032 |
2025-11-11 15:19:48 | 2025-11-11 07:35:15 |
| NVD | nvd_CVE-2018-25032 |
2025-11-11 14:56:05 | 2025-11-11 07:43:49 |
| CNNVD | cnnvd_CNNVD-202203-2221 |
2025-11-11 15:12:22 | 2025-11-11 07:57:11 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:57:11
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-202203-2221; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202203-2221
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:43:49
affected_products_count: 0 → 38; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 38
- data_sources: ['cve'] -> ['cve', 'nvd']